An attacker gains access to a Web servers database and display the contents of the table
that holds all of the names, passwords, and other user information. The attacker did this by
entering information into the Web site's user login page that the software's designers did
not expect to be entered. This is an example of what kind of software design problem?